{"vulnerability": "CVE-2021-46759", "sightings": [{"uuid": "ce036862-a386-4315-a053-f1b23a2b171b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-46759", "type": "seen", "source": "https://t.me/cibsecurity/63694", "content": "\u203c CVE-2021-46759 \u203c\n\nImproper syscall input validation in AMD TEE(Trusted Execution Environment) may allow an attacker with physical access andcontrol of a Uapp that runs under the bootloader to reveal the contents of theASP (AMD Secure Processor) bootloader accessible memory to a serial port,resulting in a potential loss of integrity.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-10T00:38:48.000000Z"}]}